期刊文献+

无线传感器网络中基于规范的入侵检测算法研究 被引量:4

Research on intrusion detection algorithm based on specification for WSN
下载PDF
导出
摘要 为了解决无线传感器网络的安全问题,提出了一种基于规范的入侵检测算法。该算法根据概率论的有关理论,对邻域节点的单位时间特征量设定阈值,阈值的设定方法具有通用性,并且阈值自适应更新,符合传感节点性能随着时间发生变化的特点。将检测节点获得的单位时间特征量值与阈值进行对比来判断入侵。通过仿真实验验证了该算法优于其他基于规范的入侵检测方案,不仅能够满足高检测率低误报率的要求,还具有较好的能效性。 To solve the security problem of wireless sensor networks,this paper proposed a kind of intrusion detection algorithm based on specification.The algorithm set threshold for characteristic quantity of neighborhood nodes in unit time accor-ding to the theory of probability.The method of threshold setting was versatile,and threshold could be updated adaptively to accord with the properties of sensor nodes changing over time.Compared the characteristic quantity in unit time from detection node with the threshold to judge invasion.Simulation results show the proposed algorithm is superior to other intrusion detection schemes based on specification,not only can meet high detection rates and low false positives,but also has good energy efficiency
作者 张帅 张凤斌
出处 《计算机应用研究》 CSCD 北大核心 2012年第9期3464-3466,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(60671049 61172168)
关键词 无线传感器网络 入侵检测 数理统计 特征量 wireless sensor networks (WSN) intrusion detection mathematical statistics characteristic quantity
  • 相关文献

参考文献10

  • 1ONAT I,MIRI A. An intrusion detection system for wireless sensor networks [ C ] //Proc of IEEE Intemationai Conference on Wireless and Mobile Computing, Networking and Communications. 2005 :253-259.
  • 2HO J W,WRIGHT M, DAS S K. Distributed detection of mobile malicious node attacks in wireless sensor networks [ J ]. Ad HOC N.t-works,2011,10(3) :512-523.
  • 3ABDUVALIYEV A, LEE S, LEE Y K. Energy efficient hybrid intrusion detection system for wireless sensor networks [ C ] //Proc of International Conference on Electronics and Information Engineering. Washington DC:IEEE Computer Society, 2010:25-29.
  • 4WALPOLE R,MYERS R. Probability and statistics for engineers and scientists[ M]. New York: Macmillan,1985.
  • 5KRONTIRIS I,DIMITRIOU T,FREILING F C. Towards intrusion detection in wireless sensor networks[ C ] //Proc of the 13th European Wireless Conference. 2007 :l-4.
  • 6曹晓梅,韩志杰,陈贵海.基于流量预测的传感器网络拒绝服务攻击检测方案[J].计算机学报,2007,30(10):1798-1805. 被引量:33
  • 7The network simulator: ns-2 [ EB/OL] . http ://www. isi. edu/nsnam/ ns.
  • 8HAI T H, HUH E N. Detecting selective forwarding attacks in wireless sensor networks using two-hops neighbor knowledge [ C ] //Proc of the 7th IEEE Intemationai Symposium on Network Computing and Applications. Washington DC: IEEE Computer Society, 2008 : 325-331. ,.
  • 9Da SILVA APR, MARTINS M H T, ROCHA B P S, e/ al. Decentralized intrusion detection in wireless sensor networks [ C ] //Proc of the 1st ACM Intemationai Workshop on Quality of Service and Security in Wireless and Mobile Networks. New York:ACM Press,2005;16-23.
  • 10任丰原,黄海宁,林闯.无线传感器网络[J].软件学报,2003,14(7):1282-1291. 被引量:1709

二级参考文献47

  • 1曾鹏,梁韡,王军,于海斌.一种基于生物免疫原理的无线传感器网络安全体系[J].小型微型计算机系统,2005,26(11):1907-1910. 被引量:10
  • 2俞波,杨珉,王治,高传善.选择传递攻击中的异常丢包检测[J].计算机学报,2006,29(9):1542-1552. 被引量:24
  • 3张重庆,李明禄,伍民友.数据收集传感器网络的负载平衡网络构建方法[J].软件学报,2007,18(5):1110-1121. 被引量:29
  • 4ALERT. http://www.altersystem.org.
  • 5Bonnet P, Gehrke J, Seshadri P. Querying the physical world. IEEE Personal Communication, 2000,7(5):10-15.
  • 6Noury N, Herve T, Rialle V, Virone G, Mercier E. Monitoring behavior in home using a smart fall sensor. In: Proceedings of the IEEE-EMBS Special Topic Conference on Microtechnologies in Medicine and Biology. Lyon: IEEE Computer Society, 2000.607~610.
  • 7Sensor Webs. http://sensorwebs.jpl.nasa.gov/.
  • 8Shill E, Cho S, Ickes N, Min R, Sinha A, Wang A, Chandrakasan A. Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks. In: Proceedings of the ACM MobiCom 2001. Rome: ACM Press, 2001. 272-286.
  • 9Akyildiz I.F, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor network: A survey. Computer Networks, 2002,38(4):393~422.
  • 10Asada G, Dong M, Lin TS, Newberg F, Pottle .G, Kaiser WJ, Marcy HO. Wireless integrated network sensors (WINS) for tactical information systems. In: Proceedings of the 1998 European Solid State Circuits Conference. New York: ACM Press, 1998. 15-20.

共引文献1740

同被引文献33

  • 1曹晓梅,韩志杰,陈贵海.基于流量预测的传感器网络拒绝服务攻击检测方案[J].计算机学报,2007,30(10):1798-1805. 被引量:33
  • 2Mubarak T M,Sattar S A,Rao G A,et al.Intrusion detection:An energy efficient approach in heterogeneous WSN [ C ]//2011 Interna-tional Conference on Emerging Trends in Electrical and Computer Technology(ICETECT),2011:1092-1096.
  • 3Khanafer M,Guennoun M,Mouftah H T.Intrusion Detection System for WSN-Based Intelligent Transportation Systems [ C ]//2010 IEEE Glob-al Telecommunications Conference(GLOBECOM 2010).2010:1-6.
  • 4Wang Y,Fu W,Agrawal D P.Intrusion detection in Gaussian distrib-uted wireless sensor networks [ C]//6th International Conference on Mobile Adhoc and Sensor Systems,MASS.IEEE,2009:313-321.
  • 5Wang Y.Intrusion detection in gaussian distributed heterogeneous wire-less sensor networks [ C ]//Global Telecommunications Conference,GLOBECOM.IEEE,2009:1-6.
  • 6Liu B,Towsley D.A study of the coverage of large-scale sensor net-works[ C ]//2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems,2004:475-483.
  • 7Bettstetter C.On the minimum node degree and connectivity of a wire-less multihop network[ C ]//Proceedings of the 3rd ACM international symposium on mobile ad hoc networking & computing,ser.MobiHoc' 02.New York,NY,USA:ACM,2002:80-91.
  • 8Bhatti S,Xu Jie. Survey of Target Tracking Protocols Using Wireless Sensor Network[A].Washington D.C.,USA:IEEE Computer Society,2009.110-115.
  • 9赵小敏;毛科技;何文秀.感测范围不规则情况下无线传感器网络节点部署算法[J]软件学报,2012(01):59-68.
  • 10Misra S,Singh S. Localized Policy-based Target Tracking Using Wireless Sensor Networks[J].ACM Transactions on Sensor Networks,2012,(03).

引证文献4

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部